Blogs en Introducing the Cyber Security Audit Program for auditors Introducing the Cyber Security Audit Program for auditors Wed, 09 Sep 2020 13:38:41 +0000 Ransomware: How to recover and get back on track Ransomware: How to recover and get back on track Tue, 11 Aug 2020 19:38:22 +0000 Ransomware: Don’t get locked out Ransomware: Don’t get locked out Tue, 11 Aug 2020 18:49:10 +0000 Thinking of moving to the cloud? Here’s how to do it securely New guidelines to help secure cloud-based services Wed, 03 Jun 2020 12:26:22 +0000 Canadian Shield – Sharing the Cyber Centre’s Threat Intelligence to Protect Canadians During the COVID-19 Pandemic Canadian Shield – Sharing the Cyber Centre’s Threat Intelligence to Protect Canadians During the COVID-19 Pandemic Thu, 16 Apr 2020 16:56:11 +0000 Staying cyber safe while teleworking Tue, 07 Apr 2020 19:07:40 +0000 What's in a Password? More Than You Think! Tue, 17 Dec 2019 18:17:41 +0000 A Special Thanks from the Director General of Cyber Defence Capabilities for GeekWeek 6 Thu, 12 Dec 2019 15:28:48 +0000 GeekTalent: How GeekWeek Works with Students GeekTalent: How GeekWeek Works with Students Wed, 20 Nov 2019 13:35:38 +0000 A Message from the Head of the Cyber Centre on the Start of GeekWeek 6 Wed, 13 Nov 2019 19:56:48 +0000 Last Time… on GeekWeek! A Recap of the 2018 Edition Thu, 07 Nov 2019 14:58:22 +0000 GeekWeek 6 is Less Than One Month Away: Everything You Need to Know About the Cyber Centre’s Annual Workshop Fri, 01 Nov 2019 14:23:13 +0000 The Path to Enterprise Security Tue, 20 Aug 2019 19:22:17 +0000 Secure Portable Media Tue, 20 Aug 2019 19:16:41 +0000 Implement Access Control and Authorization Tue, 20 Aug 2019 19:11:41 +0000 Secure Websites Tue, 20 Aug 2019 19:04:22 +0000 Secure Cloud and Outsourced IT Services Tue, 20 Aug 2019 18:58:54 +0000 Establish Basic Perimeter Defences Tue, 20 Aug 2019 18:51:50 +0000 Secure Mobility Tue, 20 Aug 2019 18:45:53 +0000 Back Up and Encrypt Data Tue, 20 Aug 2019 18:37:43 +0000 Provide Employee with Awareness Training Tue, 20 Aug 2019 17:59:49 +0000 Use Strong User Authentication Tue, 20 Aug 2019 17:54:11 +0000 Securely Configure Devices Tue, 20 Aug 2019 17:48:39 +0000 Enable Security Software Tue, 20 Aug 2019 17:43:22 +0000 Automatically Patch Operating Systems and Applications Tue, 20 Aug 2019 17:23:17 +0000 Develop an Incident Response Plan Tue, 20 Aug 2019 17:16:21 +0000 Which baseline controls are right for your organization? Tue, 20 Aug 2019 17:09:06 +0000 Introduction to the Baseline Controls Tue, 20 Aug 2019 16:43:10 +0000 Learning and Innovation Hub presents Vancouver Public Courses This coming March, the Learning and Innovation Hub will host the first of a series of public courses on cyber security in the downtown Vancouver area. These courses will likely fill up quickly, so we recommend registering early to secure a seat! Wed, 20 Feb 2019 21:30:15 +0000 Blog by Scott Jones, Head of the Cyber Centre Blog by Scott Jones: Cyber is important, every Canadian relies on it and it’s constantly under threat. Today’s cyber threat actors are becoming more effective, persistent and determined, which makes them even harder to protect and defend against. We all play an important role in cyber security; not one entity can do this alone. Mon, 04 Feb 2019 19:49:42 +0000 Blog from André Boucher, Associate Head, Canadian Centre for Cyber Security Less than six months after the official announcement was made, the federal government’s cyber security protection and defence teams were brought together under the Canadian Centre for Cyber Security (Cyber Centre), where they’ve already begun offering a unique set of services in Canada. Mon, 31 Dec 2018 15:56:42 +0000 How the National Cyber Threat Assessment came to be Tue, 11 Dec 2018 22:00:31 +0000 Cloud computing: the types There are many different cloud service and deployment models that can greatly benefit your organization. Knowing which cloud service and cloud deployment model is right for you is important. Although this list is not all-encompassing or inclusive, it summarizes the most common models. Fri, 30 Nov 2018 20:55:36 +0000 Cloud computing: the basics Cloud computing is becoming a popular IT tool for both business and personal use due to its productivity, security and economic advantages. As with any IT service provider, organizations must be able to trust new technology before they integrate it into their daily operations. Wed, 28 Nov 2018 20:29:33 +0000 Assume a breach to better protect yourself IT professionals know they need a security program that matches the value of what they’re protecting. It should also contain the latest security devices and programs, and have the latest software patches applied. But a robust security program must also assume that a breach will occur. Security programs should include methods like intrusion detection and incident response to stop attackers before they can export any critical data, or damage data or applications. Wed, 21 Nov 2018 18:57:01 +0000 Becoming cyber-aware: Know your threat surface Cyber threats can sound more complicated than they are. It is important to clarify the concepts because, in truth, cyber threats don’t have to be advanced or persistent; cyber threats can be as simple as answering our email or clicking on a link. Thu, 15 Nov 2018 17:14:08 +0000 The GeekWeek Mission has landed After nine days of intensive work by our 194 participants, another edition of GeekWeek has successfully achieved its goals. Thu, 01 Nov 2018 17:38:10 +0000 GeekWeek V projects tackle Malware, Information Sharing, and more This year is the fifth year for GeekWeek, and it’s the biggest one yet! Thu, 25 Oct 2018 16:20:34 +0000 Fact or Fiction: Quick Tips to Help Identify “Fake News” For the 4th Week of Cyber Security Awareness Month we focus on digital literacy, developing a critical eye and a few tips to help spot fake news. Mon, 22 Oct 2018 15:49:21 +0000 Keep Your Bits to Yourself: Defend Your Privacy on Social Media Connecting and collaborating through social media has never been easier; social media, blogs and wikis offer a range of entertaining and accessible features tailored to the user. Social media platforms are quick and easy to use, but it’s important to question the trade-ofs that make them convenient. Wed, 17 Oct 2018 18:53:22 +0000 GeekWeek Blog – October 2018 GeekWeek participants come from Canadian critical infrastructure sectors, academia, law enforcement, the cyber security industries, our internal partners and all levels of government to tackle cyber security challenges faced by the cyber security community. Tue, 16 Oct 2018 19:00:38 +0000 Cyber Security Awareness Month: Mid-month update We’re half-way through CSAM now. Governments, organizations and businesses across Canada, and around the world, are marking the month with events and activities. Sun, 30 Sep 2018 18:24:33 +0000 The launch of the Canadian Centre for Cyber Security October marks the start of a new federal approach to cyber security in Canada. A new manner of collaborating with Canadian businesses. A renewed approach to communicating with Canadians. Fri, 28 Sep 2018 18:18:42 +0000 Blog from Scott Jones, Head of the Cyber Centre On October 1, 2018, we launched the Canadian Centre for Cyber Security, housed under the Communications Security Establishment. Wed, 26 Sep 2018 19:16:59 +0000